|
|
|
Daniel S. Berman, Anna L. Buczak, Jeffrey S. Chavis and Cherita L. Corbett
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural ...
ver más
|
|
|